CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.35
.36
.37
.38
.39
1240
.41
.42
.43
.44
.45
...
1660
»
P-Pass
Downloaded:0
procedures want to know is how to achieve encryption and decryption of incorrect? So to download and end, simple, but not you hit me!
Date
: 2025-06-16
Size
: 159kb
User
:
叶子
substitution-cipher
Downloaded:0
substitution cipher assistant . It Will display the ciphertext underneath the guessed plaintext.
Date
: 2025-06-16
Size
: 2kb
User
:
連源
MD5_js
Downloaded:0
js MD5 algorithm in the realization jsp page for the encryption
Date
: 2025-06-16
Size
: 2kb
User
:
wumingshi
Rail_Fence_Tecknique
Downloaded:0
simple columns encryption algorithm is relatively simple for everybody to use
Date
: 2025-06-16
Size
: 3kb
User
:
he
keeloq_decode
Downloaded:0
keeloq software decoding process (from Taiwan on a website download and notes some gibberish. but not use).
Date
: 2025-06-16
Size
: 26kb
User
:
zidaozhou
DES_encode
Downloaded:0
integrity of the DES encryption algorithm, c compile builder
Date
: 2025-06-16
Size
: 207kb
User
:
zidaozhou
cryptography_matlab_codes
Downloaded:0
vigenere code declassified Matlab realized, build environment : Matlab
Date
: 2025-06-16
Size
: 17kb
User
:
zidaozhou
AES
Downloaded:0
Road through this program, further deepening the understanding of AES, understand the modular design of the basic idea, programming time, a major task decomposition is very important. in light of the corresponding sub-ta
Date
: 2025-06-16
Size
: 3kb
User
:
陈剑峰
DesLA
Downloaded:0
function : symmetric DES algorithm Safety Analysis-- linear analysis (ie eight S_Box linear analysis)
Date
: 2025-06-16
Size
: 3kb
User
:
小布丁
VC_RSA
Downloaded:0
one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e* d), which is an expo
Date
: 2025-06-16
Size
: 1.87mb
User
:
vbkey
Downloaded:0
on the encryption and decryption procedures, can also be used for digital signatures, and so on-demand
Date
: 2025-06-16
Size
: 10kb
User
:
weini
jonathan
Downloaded:0
without extracting passwords, using java language of encryption and decryption procedures
Date
: 2025-06-16
Size
: 21kb
User
:
李冰
«
1
2
...
.35
.36
.37
.38
.39
1240
.41
.42
.43
.44
.45
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.